-
1
-
-
2942747407
-
A note on negligible functions
-
Bellare, M.: A note on negligible functions. Journal of Cryptology 15(4), 271-284 (2002)
-
(2002)
Journal of Cryptology
, vol.15
, Issue.4
, pp. 271-284
-
-
Bellare, M.1
-
2
-
-
0001868672
-
Optimal asymmetric encryption-how to encrypt with RSA
-
De Santis, A, ed, EUROCRYPT 1994, Springer, Heidelberg
-
Bellare, M., Rogaway, P.: Optimal asymmetric encryption-how to encrypt with RSA. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 92-111. Springer, Heidelberg (1995)
-
(1995)
LNCS
, vol.950
, pp. 92-111
-
-
Bellare, M.1
Rogaway, P.2
-
3
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: Proceedings of CCS 1993, pp. 62-73 (1993)
-
(1993)
Proceedings of CCS
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
4
-
-
38049118731
-
-
Cachin, C., Crépeau, C., Marcil, J.: Oblivious transfer with a memory-bounded receiver. In: Proceedings of STOC 2002, pp. 493-502.
-
Cachin, C., Crépeau, C., Marcil, J.: Oblivious transfer with a memory-bounded receiver. In: Proceedings of STOC 2002, pp. 493-502.
-
-
-
-
5
-
-
84958598231
-
Unconditional security against memory-bounded adversaries
-
Kaliski Jr, B.S, ed, CRYPTO 1997, Springer, Heidelberg
-
Cachin, C., Maurer, U.: Unconditional security against memory-bounded adversaries. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 292-306. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1294
, pp. 292-306
-
-
Cachin, C.1
Maurer, U.2
-
6
-
-
0031619016
-
The random oracle methodology, revisited
-
Canetti, R., Goldreich, O., Halevi, S.: The random oracle methodology, revisited. In: Proceedings of STOC 1998, pp. 209-218 (1998)
-
(1998)
Proceedings of STOC 1998
, pp. 209-218
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
7
-
-
0036040061
-
Tight security proofs for the bounded-storage model
-
Dziembowski, S., Maurer, U.: Tight security proofs for the bounded-storage model. In: Proceedings of STOC 2002, pp. 341-350 (2002)
-
(2002)
Proceedings of STOC 2002
, pp. 341-350
-
-
Dziembowski, S.1
Maurer, U.2
-
8
-
-
4043135942
-
-
Federal Information Processing Standards Publications, SHS, August
-
Federal Information Processing Standards Publications. FIBS PUB 180-2: Secure Hash Standard (SHS) (August 2002)
-
(2002)
FIBS PUB 180-2: Secure Hash Standard
-
-
-
9
-
-
4344662082
-
RSA-OAEP is secure under the RSA assumption
-
Fujisaki, E., Okamoto, T., Pointcheval, D., Stern, J.: RSA-OAEP is secure under the RSA assumption. Journal of Cryptology 17(2), 81-104 (2004)
-
(2004)
Journal of Cryptology
, vol.17
, Issue.2
, pp. 81-104
-
-
Fujisaki, E.1
Okamoto, T.2
Pointcheval, D.3
Stern, J.4
-
10
-
-
33644600483
-
Bounds on the efficiency of generic cryptographic constructions
-
Gennaro, R., Gertner, Y., Katz, J., Trevisan, L.: Bounds on the efficiency of generic cryptographic constructions. SIAM J Computing 35(1), 217-246 (2005)
-
(2005)
SIAM J Computing
, vol.35
, Issue.1
, pp. 217-246
-
-
Gennaro, R.1
Gertner, Y.2
Katz, J.3
Trevisan, L.4
-
11
-
-
0027306732
-
A uniform-complexity treatment of encryption and zero-knowledge
-
Goldreich, O.: A uniform-complexity treatment of encryption and zero-knowledge. Journal of Cryptology 6(1), 21-53 (1993)
-
(1993)
Journal of Cryptology
, vol.6
, Issue.1
, pp. 21-53
-
-
Goldreich, O.1
-
12
-
-
0039247627
-
Very strong one-way functions and pseudo-random generators exist relative to a random oracle
-
Manuscript
-
Impagliazzo, R.: Very strong one-way functions and pseudo-random generators exist relative to a random oracle. Manuscript (1996)
-
(1996)
-
-
Impagliazzo, R.1
-
13
-
-
84941465845
-
A lower bound for discrimination information in terms of variation (corresp.)
-
Kullback, S.: A lower bound for discrimination information in terms of variation (corresp.). IEEE Transactions on Information Theory 13(1), 126-127 (1967)
-
(1967)
IEEE Transactions on Information Theory
, vol.13
, Issue.1
, pp. 126-127
-
-
Kullback, S.1
-
14
-
-
0026698501
-
Conditionally-perfect secrecy and a provably-secure randomized cipher
-
Maurer, U.: Conditionally-perfect secrecy and a provably-secure randomized cipher. Journal of Cryptology 5(1), 53-66 (1992)
-
(1992)
Journal of Cryptology
, vol.5
, Issue.1
, pp. 53-66
-
-
Maurer, U.1
-
15
-
-
35248825608
-
On deniability in the common reference string and random oracle model
-
Boneh, D, ed, CRYPTO 2003, Springer, Heidelberg
-
Pass, R.: On deniability in the common reference string and random oracle model. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 316-337. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2729
, pp. 316-337
-
-
Pass, R.1
-
16
-
-
84887264252
-
Formalizing human ignorance: Collision-resistant hashing without the keys
-
Nguyen, P.Q, ed, VIETCRYPT 2006, Springer, Heidelberg
-
Rogaway, P.: Formalizing human ignorance: Collision-resistant hashing without the keys. In: Nguyen, P.Q. (ed.) VIETCRYPT 2006. LNCS, vol. 4341, pp. 221-228. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4341
, pp. 221-228
-
-
Rogaway, P.1
-
17
-
-
38049106552
-
-
RSA Laboratories. PKCS #1: RSA Cryptography Standard, Version 2.1, 2002
-
RSA Laboratories. PKCS #1: RSA Cryptography Standard, Version 2.1, 2002.
-
-
-
-
18
-
-
38049104648
-
Random oracles and auxiliary input
-
Full version of this paper
-
Unruh, D.: Random oracles and auxiliary input. IACR ePrint, 2007/168. Full version of this paper
-
IACR ePrint
, pp. 2007-2168
-
-
Unruh, D.1
-
19
-
-
38049175856
-
Zero knowledge in the random oracle model, revisited
-
Manuscript
-
Wee, H.: Zero knowledge in the random oracle model, revisited. Manuscript (2006)
-
(2006)
-
-
Wee, H.1
|